CrowdSec
7/10CrowdSec Score

ejs - RCE (CVE-2023-29827)

Published on04-05-2023
First seen on08-07-2025
CVSS 9.8/10ejs - ejs

48Exploiting IPs reported

ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter. NOTE: this is disputed by the vendor because the render function is not intended to be used with untrusted input.

CrowdSec analysis

CVE-2023-29827 is a vulnerability in ejs v3.1.9 allows for server-side template injection if an attacker can control the EJS file and manipulate the closeDelimiter parameter. This flaw could potentially be exploited for remote code execution (RCE), enabling attackers to run arbitrary code on the server. However, the vendor disputes the risk, noting that the render function is not intended for use with untrusted input.

CrowdSec has been tracking this vulnerability and its exploits since 30th of June 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2023-29827 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. In addition, according to the CrowdSec network, attack volume against CVE-2023-29827 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit this vulnerability by injecting malicious JavaScript code into the settings[view options][closeDelimiter] parameter of the /page endpoint, enabling remote code execution via EJS template injection.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.